We know the criticality and confidentiality of the people data that PeopleStrong Alt interacts with. So we provide world class security features in our cloud infrastructure. We ensure compliance with all data privacy and security regulations, undergo regular security audits, and support multiple levels of access controls and data handling procedures that maintain data integrity and prevent misuse.
Successfully assessed on SSAE 16 standards, we believe in providing the highest level of security, thus easing all your security related worries.
Hosted on private cloud of Asia’s Largest and India’s Only Tier 4 Certified Datacenter, PeopleStrong Alt is geared up with all the necessary security controls. Our private cloud provider is ISO 27001 certified and following the ISMS practices.
The BS- 25999 certified datacenter is human error proof and provides 99.995% uptime through n+n system redundancy with full proof Business continuity and disaster recovery plan is in place by maintain backups locally and at other secured locations.
The client data is secured by multiple levels of security through Unified Threat management system (Firewall, Anti-virus, Anti-Spam, and intrusion detection), Physical security (card based access, fire control system, CCTV, visitor management system) and data security.
Downtime is avoided by preventing power spikes, surges, and brownouts with redundant power links to local utilities, backup batteries, and uninterruptible power supplies and Shield against natural disasters and calamity provided.
The Alt Platform is hosted in a secure server environment that uses multiple firewalls, access controls, intrusion detection systems to avoid any external intrusions.
Application-level firewall monitors and validates all traffic between the application and database tiers to prevent attacks such as SQL injections from reaching the database server.
Regular database audits are maintained through audit and log trails that maintain records demonstrating proof of origin; all alterations, additions, and deletions; the date timestamp of a data change; and approvals. To maintain an audit log’s viability, the log is unalterable, encrypted.
Load balancing is done at multiple tiers to ensure consistent availability of database.
Full and incremental data backups weekly and full archive logs backups daily are taken up. All customer data is classified confidential.
The application is written in Java and adhere to the Java 2 Enterprise Edition (J2EE) specifications.
It dynamically produce every page and send it to the user’s desktop using 128-bit Secure Socket Layer (SSL) tight encryption that protects from insider threats.
Role based access control helps ensure security at function, transaction, field, and data levels. No person can hold a role that exercises audit, control, or review authority over another concurrently held role.
PeopleStrong Alt uses LDAP authentication for Single sign-on and identity federation. SCIM (Simple Cloud Identity Management) is done through 4 A’s. Authentication, Authorization, Account Management, Audit Logging.
Secure Socket Layer (SSL) technology is also in place, which protects application information accessed through a browser using server authentication and data encryption.
Network and communication
Industry-leading routers/ switches, and load balancers are configured to provide secure & highly available access and at the same time very component of the IT network is meticulously configured, deployed, maintained, and continually tested for optimal performance.
N+N redundant connections provide highly available network access, providing seamless failover between devices.
A multitier network architecture limits internal network traffic to pass along only the data required by the application.
Incoming user requests are passed through the firewall down to the load balancers, and load balancers distribute the traffic to the appropriate Web server (presentation tier) for processing. The Web server then makes independent requests to the application tier, and the application tier makes independent requests to the database tier. At each level, the incoming request is validated against business and security rules to protect against malicious access. Requests that fail validation are terminated.
Traffic within each tier is restricted. Only required ports are enabled on servers and permitted between VLANs.
The firewall separating the application and database tiers uses a default policy that drops all traffic unless specifically required.